Category Archives: Identity

How healthcare providers are taking cues from consumer expectations to improve patient experiences

A discussion on how healthcare providers are employing processes and technologies from such industries as retail and financial services to vastly improve the experience and quality of care from the medical patients’ perspective. Continue reading

Advertisements
Posted in Business intelligence, Cloud computing, data analysis, electronic medical records, ERP, healthcare, Identity, Information management, machine learning, procurement, Security, supply chain, User experience | Tagged , , , , , , , , , , | Leave a comment

Data-driven and intelligent healthcare processes improve patient outcomes while making the IT increasingly invisible

A discussion on how healthcare providers employ new breeds of intelligent digital workspace technologies to improve doctor and patient experiences, make technology easier to use, and assist in bringing actionable knowledge resources to the integrated healthcare environment. Continue reading

Posted in application transformation, artificial intelligence, Business intelligence, Citrix, Cloud computing, data center, Data center transformation, electronic medical records, Enterprise architect, enterprise architecture, healthcare, Identity, Internet of Things, machine learning, Security, User experience, Virtualization | Tagged , , , , , , , , , , | Leave a comment

GDPR forces rekindling of people-centric approach to marketing

The next BriefingsDirect digital business innovation discussion explores how modern marketing is impacted by the General Data Protection Regulation (GDPR). Those seeking to know their customers well are finding that this sweeping new European Union (EU) law forces a dramatic shift in how … Continue reading

Posted in Ariba, artificial intelligence, big data, Business networks, Cloud computing, Cyber security, data analysis, Enterprise transformation, Identity, Information management, marketing, Networked economy, procurement, risk assessment, SAP, SAP Ariba, Security, supply chain, User experience | Tagged , , , , , , , , , , , , , , | Leave a comment

How a large Missouri medical center developed an agile healthcare infrastructure security strategy

Healthcare provider organizations are among the most challenging environments to develop and implement comprehensive and agile security infrastructures. These providers of healthcare are usually sprawling campuses with large ecosystems of practitioners, suppliers, and patient-facing facilities. They also operate under stringent … Continue reading

Posted in application transformation, Bitdefender, Citrix, Cloud computing, Cyber security, Data center transformation, disaster recovery, Help desk, Identity, Security, server, User experience, Virtualization, VMware | Tagged , , , , , , , , , , , , , | Leave a comment

How a Florida school district tames the wild west of education security at scale and on budget

Bringing a central IT focus to large public school systems has always been a challenge, but bringing a security focus to thousands of PCs and devices has been compared to bringing law and order to the Wild West. For the … Continue reading

Posted in big data, Cloud computing, Cyber security, disaster recovery, Enterprise architect, Government, Help desk, Identity, Microsoft, Security, social media | Tagged , , , , , , , , , , , , , | Leave a comment

Women in business leadership — networking their way to success

The next BriefingsDirect digital business insights panel discussion focuses on the evolving role of women in business leadership. We’ll explore how pervasive business networks are impacting relationships and changes in business leadership requirements and opportunities for women. Listen to the … Continue reading

Posted in Ariba, Business networks, Cloud computing, Data center transformation, Enterprise architect, enterprise architecture, Enterprise transformation, ERP, Identity, managed services, Networked economy, Platform 3.0, procurement, professional services, SAP, SAP Ariba, social media, Spot buying, User experience | Tagged , , , , , , , , , , , , | Leave a comment

The next line of defense—How new security leverages virtualization to counter sophisticated threats

When it comes to securing systems and data, the bad guys are constantly upping their games — finding new ways to infiltrate businesses and users. Those who protect systems from these cascading threats must be ever vigilant for new technical … Continue reading

Posted in application transformation, big data, Bitdefender, Citrix, Cloud computing, Cyber security, data analysis, data center, DevOps, Enterprise architect, enterprise architecture, Enterprise transformation, Government, Identity, risk assessment, Security, Virtualization | Tagged , , , , , , , , , , , , | Leave a comment